dc.contributor.author | Neumann, Peter G. | |
dc.contributor.author | Rivest, Ronald L. | |
dc.contributor.author | Schiller, Jeffrey I. | |
dc.contributor.author | Schneier, Bruce | |
dc.contributor.author | Weitzner, Daniel J. | |
dc.contributor.author | Anderson, Ross | |
dc.contributor.author | Bellovin, Steven M. | |
dc.contributor.author | Benaloh, Josh | |
dc.contributor.author | Blaze, Matt | |
dc.contributor.author | Diffie, Whitfield "Whit" | |
dc.contributor.author | Gilmore, John | |
dc.contributor.author | Green, Matthew | |
dc.contributor.author | Landau, Susan | |
dc.contributor.author | Abelson, Hal | |
dc.contributor.author | Specter, Michael | |
dc.date.accessioned | 2016-04-19T19:12:54Z | |
dc.date.available | 2016-04-19T19:12:54Z | |
dc.date.issued | 2015-10 | |
dc.identifier.issn | 00010782 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/102271 | |
dc.description.abstract | Mandating insecurity by requiring government access to all data and communications. | en_US |
dc.language.iso | en_US | |
dc.publisher | Association for Computing Machinery (ACM) | en_US |
dc.relation.isversionof | http://dx.doi.org/10.1145/2814825 | en_US |
dc.rights | Creative Commons Attribution-Noncommercial-Share Alike | en_US |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/4.0/ | en_US |
dc.source | MIT web domain | en_US |
dc.title | Keys under doormats | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield "Whit" Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, and Daniel J. Weitzner. 2015. Keys under doormats. Commun. ACM 58, 10 (September 2015), 24-26. | en_US |
dc.contributor.department | Lincoln Laboratory | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
dc.contributor.mitauthor | Abelson, Hal | en_US |
dc.contributor.mitauthor | Schiller, Jeffrey I. | en_US |
dc.contributor.mitauthor | Specter, Michael | en_US |
dc.contributor.mitauthor | Weitzner, Daniel J. | en_US |
dc.relation.journal | Communications of the ACM | en_US |
dc.eprint.version | Author's final manuscript | en_US |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
eprint.status | http://purl.org/eprint/status/NonPeerReviewed | en_US |
dspace.orderedauthors | Abelson, Harold "Hal"; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce; Specter, Michael A.; Weitzner, Daniel J.; Anderson, Ross; Bellovin, Steven M.; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield "Whit"; Gilmore, John; Green, Matthew; Landau, Susan | en_US |
dc.identifier.orcid | https://orcid.org/0000-0002-5328-7821 | |
dc.identifier.orcid | https://orcid.org/0000-0003-1487-4406 | |
mit.license | OPEN_ACCESS_POLICY | en_US |